Professional Documents
Culture Documents
ERP
Functions Of Enterprise
Engineering Design
Inventory
Enterprise
Production Planning
Controlling
Business Process
A business process is a sequence of activities followed by individuals in a business to achieve some business goal.
Often these are manual activities executed by employees who play certain roles in the business in addition to others who are external to the business: customers, business partners, etc.
Business Process
Human resources
Enterprise Systems
Enterprise systems, also known as enterprise resource planning (ERP) systems, provide a single information system for organizationwide coordination and integration of key business processes. Information that was previously fragmented in different systems can seamlessly flow throughout the firm so that it can be shared by business processes in manufacturing, accounting, human resources, and other areas.
6
ERP or Enterprise Resource Planning systems are software systems for businesses management encompassing modules supporting functional areas such as sales and marketing, finance, production, distribution accounting, human resource management, maintenance, inventory management, project management, transportation and ebusiness etc. Business strategy and set of industry-domain-specific applications that build customer and shareholder communities value network system by enabling and optimizing enterprise and inter-enterprise collaborative operational and financial processes (Source: Gartners Research Note SPA-12-0420)
ERP Software
Software solution that addresses the Enterprise needs, taking a process view of the overall organization to meet the goals, by tightly integrating all functions and under a common software platform
ERP is a commodity -- product in the form of software SAP, Oracle Applications, PeopleSoft, JD Edwards, Great plains etc. are worlds leading ERP packages
8
Difficult to build: Require fundamental changes in the way the business operates Technology: Require complex pieces of software and large investments of time, money, and expertise Centralized organizational coordination and decision making: Not the best way for the firms to operate
9
Business Process Re-engineering [BPR] brings out the deficiencies of the existing setup BPR and ERP will give way to implement new systems and the long pending improvements in the existing systems BPR may be time consuming but the scope can be restricted & controlled by the Management
11
12
Vendors
14
ICWAI IS
15
What is security?
Information
Hardware failure Software failure Personnel actions Terminal access penetration Theft of data, services, equipment
Fire Electrical problems User errors Unauthorized program changes Telecommunication problems
17
Disaster
Destroys computer hardware, programs, data files, and other equipment
Security
Prevents unauthorized access, alteration, theft, or physical damage
Errors
Cause computers to disrupt or destroy organizations record-keeping and operations
18
19
Controls
Methods, policies, and procedures that ensure protection of organizations assets Ensure accuracy and reliability of records, and operational adherence to management standards
20
Application controls
Specific controls unique to each computerized application, such as payroll or order processing Include both automated and manual procedures
Ensure that only authorized data are completely and accurately processed by that application
Include: Input controls Processing controls Output controls
21
Risk Assessment
Determines level of risk to firm if specific activity or process is not properly controlled
Types of threat Probability of occurrence during year
30% 5% 98%
22
technologies enabling system to recover quickly from a crash. Fault Tolerant system
Access Control
Access control: Consists of all the policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders
Identification
Identification
Use of user name or other public information. Know identification component requirements.
25
Authentication
Authentication
Something a person is, has, or does. Use of biometrics, passwords, passphrase, token, or other private information.
Authorization
Authorization
Determines that the proven identity has some set of characteristics associated with it that gives it the right to access the requested resources.
27
Authorization
28
Check digits, appended to the end of a long number can provide some protection against data input errors.
The last character of UPC barcodes and ISBNs are check digits.
Longer data streams require more economical and sophisticated error detection mechanisms. Cyclic redundancy checking (CRC) codes provide error detection for large blocks of data.
29